Chapter 05: Analyzing Vulnerability Scans Flashcards

1
Q

Analyzing Vulnerability Scans

A

This is almost a frame-for-frame recap of the chapter from CySA+

Review that deck for more:

CySA Chapter 7

Anything new will be added in the cards below

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rootkits

A

Hacking tools designed to automate privilege escalation attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Arbitrary Code Execution

A

ACE vulnerabilities allow attackers to run software of their choice on a targeted system

RCE are even more dangerous subset of ACE because the attacker can exploit the vulnerability over a network connection without having physical or logical access to the target system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Firmware

A

Computer code stored in nonvolatile memory on a device where it can survive a reboot

Like any code, it can contain vulnerabilities

Presents a unique oppty for pentesters becaues they often remain unpatched

Pentesters can use a firmware vulnerability in a nonstandard computing device to gain a foothold on a network and then pivot to other systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spectre and Meltdown

A

Two hardware vulnerabilities in almost every microprocessor manufactured during the last two decades (pre 2017)

The vulnerabilities exploit a feature of the chips known as speculative execution to allow processes to gain access to information reserved for other processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Detecting Hardware Vulnerabilities

A

Often requires the use of credentialed vulnerability scans, configuration management tools, or other approaches that leverage inside access to the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Point of Sale Vulnerabilities

A

POS systems in retail stores, restaurants, hotels, etc are lurative targets for attackers and pentesters alike

The systems store, process, and transmite CC information

Typically they run either standard or specialized versions of common OS, with many variants of MS Windows

They require the same level of patching and security controls as any other Windows system and are subject to the same security vulnerabilities as those devices

POS systems must comply with PCI-DSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly